Fig. 4From: Bin2vec: learning representations of binary executable programs for security tasksSchematic depiction of obtaining a program representation with a single-layer GCN modelBack to article page